2023 | Information and Organization | Citations: 0
Authors: Arora, A.; Barrett, M.; Lee, E.; Oborn, E.; Prince, K.
Abstract: ... Expand
Semantic filters: IT policy
Topics: artificial intelligence algorithmic bias responsible artificial intelligence legal context outsourcing
Methods: computational algorithm design methodology generative adversarial network
2023 | Communications of the Association for Information Systems | Citations: 0
Authors: Gebauer, Judith; Modaresnezhad, Minoo; Sibona, Christopher; Matthews, Kevin
Abstract: Stakeholder analysis is a methodology that can provide valuable insights about ... Expand
Semantic filters: IT policy
Topics: IT project strategic management internet technology project management electronic mail
Methods: theory development case study survey qualitative interview triangulation
2023 | Information Systems Research | Citations: 0
Authors: Liang, Chen; Peng, Jing; Hong, Yili; Gu, Bin
Abstract: Monitoring, a digital surveillance technology that allows employers to track the ... Expand
Semantic filters: IT policy
Topics: information privacy concern platform worker privacy IT policy IT work
Methods: experiment survey experimental design regression analysis method mediation analysis
2023 | European Journal of Information Systems | Citations: 0
Authors: Lorenz, Felix; Buchwald, Arne
Abstract: Several organisations have introduced a new leadership role, the Chief Digital O ... Expand
Semantic filters: IT policy
Topics: Chief Information Officer digital transformation information technology infrastructure innovation management digital innovation
Methods: qualitative interview qualitative coding triangulation personal interview descriptive statistic
Theories: role theory conflict theory
2023 | European Journal of Information Systems | Citations: 0
Authors: McBride, Neil; Liyala, Samuel
Abstract: M-PESA is the world’s leading mobile money system which supports the person-to-p ... Expand
Semantic filters: IT policy
Topics: mobile payment mobile system social identity social media social network
Methods: qualitative interview field study focus group biometric measurement facial recognition system
2023 | Communications of the Association for Information Systems | Citations: 0
Authors: Ncube, Tomy; Murray, Una; Dennehy, Denis
Abstract: Social protection systems, a target of the United Nation's (UN) Sustainable Dev ... Expand
Semantic filters: IT policy
Topics: user centered design IT policy innovation management climate change Sustainable Development Goal
Methods: qualitative interview case study design methodology personal interview qualitative content analysis
2023 | HICSS | Citations: 0
Authors: Pereira Piedra, I.; Rodríguez Bolívar, M.; Alcaide Muñoz, L.
Abstract: The rapid growth of the population in cities has given rise to major urban chal ... Expand
Semantic filters: IT policy
Topics: IT manager IT project systems implementation decision making mobile application
Methods: survey descriptive statistic case study statistical power analysis
2023 | European Journal of Information Systems | Citations: 0
Authors: Shirish, Anuragini; Srivastava, Shirish C.; Panteli, Niki
Abstract: Despite the economic and societal significance of microbusinesses (MBs), digital ... Expand
Semantic filters: IT policy
Topics: digital transformation pandemic anonymity information technology capability electronic business
Methods: focus group qualitative interview theory development survey design self reported survey
Theories: theory of economic development
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Zhu, Xiaohua; Yang, Shengnan
Abstract: Despite the increasing scholarly attention to disinformation, there is a lack o ... Expand
Semantic filters: IT policy
Topics: disinformation misinformation social media IT policy database system
Methods: qualitative content analysis qualitative coding archival research card sorting
2023 | Journal of the Association for Information Systems | Citations: 0
Authors: Zhu, Jiawen; Feng, Gengzhong; Liang, Huigang; Tsui, Kwok-Leung
Abstract: This paper examines the underlying mechanisms through which paternalistic leade ... Expand
Semantic filters: IT policy
Topics: data security organizational context information security management organizational value IT policy
Methods: survey digital trace data self reported survey post-hoc analysis factor analysis
Theories: general deterrence theory